李莉 |
学历:博士研究生 | 职称:讲师 |
学科专长:人工智能安全、多媒体信息安全 |
所属学科方向(团队):人工智能安全 | 办公室:T805 |
联系电话: | Email:llichn@shu.edu.cn |
个人简介(简历):
李莉,博士毕业于中国科学技术大学,曾赴意大利锡耶纳大学交流 1 年。主持国家自然科学基金青年项目1项、中国博士后基金面上项目 1 项。博士后期间入选上海市“超级博士后”激励资助计划。在TNNLS、TMM、TCSVT、TCOMM等国际著名期刊发表论文10余篇,曾获全国信息隐藏暨多媒体信息安全学术大会(CIHW)“优秀论文奖”、 国际云计算与安全会议 (ICCCS) “优秀论文奖”。现担任TDSC、TCOMM、IoT、IJCV 等期刊审稿人。担任中国图象图形学学会数字媒体取证与安全专委会委员,并参与编写信息安全领域教材《多媒体与人工智能安全》。
科研方向:
人工智能安全、深度学习模型水印
研究生培养:
担任硕士研究生导师
承担或参与的科研项目:
[1] 国家自然科学基金青年基金项目,2023,主持
[2] 中国博士后科学基金面上项目,2023, 主持
[3] 国家自然科学基金委员会面上项目, 2023, 参与
[4] 上海市自然科学基金面上项目, 2023, 参与
[5] 上海市青年科技英才扬帆计划, 2023, 参与
主要学术论文:
[1] Li Li, Weiming Zhang, and Mauro.Barni, “Covert Task Embedding: Turning a DNN into an Insider Agent Leaking out Private Information,” IEEE Transactions on Neural Networks and Learning Systems , 2023.
[2] Li Li, Weiming Zhang, Kejiang Chen and Nenghai Yu, “Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks,” IEEE Transactions on Multimedia, vol. 22, no. 10, pp. 2526 - 2536, 2019.
[3] Li Li, Weiming Zhang, Chuan Qin, Kejiang Chen, Wenbo Zhou and Nenghai Yu, “Adversarial batch image steganography against CNN-based pooled steganalysis,” Signal Processing, vol. 181, no. 107920, pp. 1 - 11, 2021.
[4] Li Li, Weiming Zhang, and Mauro.Barni, “Universal BlackMarks: Key-image-free Blackbox Multi-bit Watermarking of Deep Neural Networks,” IEEE Signal Processing Letters , vol.30, pp.36-40, 2023.
[5] Li Li, Xinpeng Zhang, Kejiang Chen et.al, “Image Steganography and Style Transformation Based on Generative Adversarial Network,” Mathematics, vol. 12, no. 4, pp. 615, 2024.
[6] Li Li, Weiming Zhang, Kejiang Chen and Nenghai Yu, “Side channel steganalysis: When behavior is considered in steganographer detection,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 8041- 8055, 2019.
[7] Deyang Wu, Li Li, jiayan Wang Penghui Ma, Zichi Wang and Hanzhou Wu, “Robust zero-watermarking scheme using DT CWT and improved differential entropy for color medical images,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 8, pp. 101708, 2023.
[8] Zihan Yuan, Li Li, Zichi Wang, Xinpeng Zhang, “Ambiguity attack against stable diffusion model watermarking,” Signal Processing , 2024.
[9] Weixiang Li, Weiming Zhang, Li Li, Zhou Hang and Nenghai Yu “Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes,” IEEE Transactions on Communications, vol. 68, no. 7, pp. 3948 - 3962, 2020.
[10] Jiayan Wang, Deyang Wu, Xinpeng Zhang, Li Li, Guirui Feng, “Novel robust video watermarking scheme based on concentric ring subband and visual cryptography with piecewise linear chaotic mapping,” IEEE Transactions on Circuits and Systems for Video Technology , 2024.